Trust, Privacy and Security in E-Business: Requirements and Solutions

An important aspect of e-business is the area of e-commerce. One of the most severe restraining factors for the proliferation of e-commerce, is the lack of trust between customers and sellers, consumer privacy concerns and the lack of security measures required to assure both businesses and customers that their business relationship and transactions will be carried out in privacy, correctly, and timely. This paper considers trust privacy and security issues in e-commerce applications and discusses methods and technologies that can be used to fulfil the pertinent requirements.

[1]  Carl F. Fey,et al.  Electronic commerce in Russia , 2001 .

[2]  Terry Winograd,et al.  Understanding computers and cognition , 1986 .

[3]  Günther Pernul,et al.  Trust for Electronic Commerce Transactions , 1999, ADBIS.

[4]  Steffen Staab,et al.  The Pudding of Trust , 2004, IEEE Intell. Syst..

[5]  Tharam S. Dillon,et al.  Managing the dynamic nature of trust , 2004 .

[6]  Ildemaro Araujo Privacy mechanisms supporting the building of trust in e-commerce , 2005, 21st International Conference on Data Engineering Workshops (ICDEW'05).

[7]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[8]  Joobin Choobineh,et al.  Trust in electronic commerce: definition and theoretical considerations , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.

[9]  Javier Lopez,et al.  Trust and privacy in digital business : First International Conference, TrustBus 2004, Zaragoza, Spain, August 30-September 1, 2004 : proceedings , 2004 .

[10]  Stefanos Gritzalis,et al.  Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture , 2000, Comput. Secur..

[11]  Joan Feigenbaum,et al.  The KeyNote Trust-Management System Version 2 , 1999, RFC.

[12]  Diomidis Spinellis,et al.  User Requirements of Trusted Third Parties in Europe , 1999 .

[13]  Michael K. Reiter,et al.  Anonymous Web transactions with Crowds , 1999, CACM.

[14]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[15]  Ann Macintosh,et al.  Trust in Public Administration e-Transactions: e-Voting in the UK , 2004, TrustBus.

[16]  X Itu,et al.  Information technology-open systems interconnection-the directory: Public-key and attribute certific , 2000 .

[17]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[18]  Rachel Burnett Legal aspects of e-commerce , 2000 .

[19]  Javier Lopez,et al.  Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings , 2005, TrustBus.

[20]  J. Feigenbaum,et al.  The KeyNote trust management system version2, IETF RFC 2704 , 1999 .

[21]  Rolf Oppliger,et al.  Authentication and authorization infrastructures (AAIs): a comparative survey , 2004, Comput. Secur..

[22]  Mark R. Brown,et al.  Investigating the Relationship between Internet Privacy Concerns and Online Purchase Behavior , 2004, J. Electron. Commer. Res..

[23]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[24]  E. Turban,et al.  Electronic Commerce 2004: A Managerial Perspective , 2003 .

[25]  E. Turban,et al.  Electronic Commerce: A Managerial Perspective , 1999 .

[26]  John Paynter,et al.  Privacy issues on the Internet , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[27]  Roger Clarke,et al.  Internet privacy concerns confirm the case for intervention , 1999, CACM.